Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Diego

Region: California

Country: United States

Internet Service Provider: CARInet Inc.

Hostname: unknown

Organization: CariNet, Inc.

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
botsattack
hacking
2024-02-23 13:48:47
attack
connect from ninja.census.shodan.io[71.6.158.166] all over the postfix logs.
2020-10-06 04:51:09
attack
connect from ninja.census.shodan.io[71.6.158.166] all over the postfix logs.
2020-10-05 20:53:55
attackspambots
Automatic report - Banned IP Access
2020-10-05 12:42:50
attackbots
 TCP (SYN) 71.6.158.166:20041 -> port 22, len 44
2020-09-23 00:01:51
attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 58 - port: 1599 proto: tcp cat: Misc Attackbytes: 60
2020-09-22 16:05:12
attack
Icarus honeypot on github
2020-09-22 08:08:23
attackspambots
" "
2020-08-23 20:46:15
attackspam
Telnet Server BruteForce Attack
2020-08-23 17:04:07
attackbotsspam
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 8069 [T]
2020-08-16 20:10:26
attackspambots
port
2020-08-14 18:34:00
attackspam
Scanned 1 times in the last 24 hours on port 21
2020-08-11 08:53:53
attackspambots
 UDP 71.6.158.166:21934 -> port 47808, len 45
2020-08-03 21:43:41
attackspam
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 5007
2020-07-29 14:02:03
attackspam
Jul 21 17:49:44 debian-2gb-nbg1-2 kernel: \[17605118.331840\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=71.6.158.166 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=110 ID=29494 PROTO=TCP SPT=19330 DPT=4242 WINDOW=39658 RES=0x00 SYN URGP=0
2020-07-22 00:13:18
attackbotsspam
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 2762
2020-07-21 14:13:59
attack
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 9000
2020-07-13 15:53:24
attackbots
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 902
2020-07-11 04:20:03
attackbots
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 9595
2020-07-07 03:15:20
attackspam
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 4443
2020-06-10 17:31:35
attack
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 2121
2020-06-08 17:56:15
attackbotsspam
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 8112 [T]
2020-06-07 22:13:41
attackbots
4840/tcp 2379/tcp 1521/tcp...
[2020-03-31/06-01]324pkt,180pt.(tcp),22pt.(udp)
2020-06-01 17:32:28
attack
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 873
2020-06-01 00:15:44
attackbots
 TCP (SYN) 71.6.158.166:29011 -> port 8090, len 44
2020-05-26 11:38:00
attackbots
Fail2Ban Ban Triggered
2020-05-11 06:53:44
attack
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 8500
2020-05-10 21:10:28
attackspam
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 10250
2020-05-07 03:37:02
attack
[portscan] tcp/81 [alter-web/web-proxy]
in blocklist.de:'listed [bruteforcelogin]'
*(RWIN=38362)(04261133)
2020-04-26 18:52:16
attack
[Tue Apr 21 10:24:18 2020] - DDoS Attack From IP: 71.6.158.166 Port: 18020
2020-04-23 19:28:13
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.6.158.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12836
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;71.6.158.166.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Mar 30 10:36:05 +08 2019
;; MSG SIZE  rcvd: 116

Host info
166.158.6.71.in-addr.arpa domain name pointer ninja.census.shodan.io.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
166.158.6.71.in-addr.arpa	name = ninja.census.shodan.io.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
37.156.146.132 attackspam
SMB Server BruteForce Attack
2020-02-17 04:52:04
18.222.129.155 attack
5 : Block HTTP using HEAD/TRACE/DELETE/TRACK methods=>/images/jdownloads/screenshots/update.php
2020-02-17 04:18:28
159.203.64.91 attackbots
Invalid user oracle from 159.203.64.91 port 37826
2020-02-17 04:41:56
36.68.162.141 attack
Feb 16 20:20:13 pornomens sshd\[14774\]: Invalid user robina from 36.68.162.141 port 36504
Feb 16 20:20:13 pornomens sshd\[14774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.68.162.141
Feb 16 20:20:16 pornomens sshd\[14774\]: Failed password for invalid user robina from 36.68.162.141 port 36504 ssh2
...
2020-02-17 04:14:32
184.90.73.120 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 04:25:31
71.6.147.254 attack
" "
2020-02-17 04:49:27
40.123.212.51 attack
Feb 16 16:44:02 server sshd\[4863\]: Invalid user test from 40.123.212.51
Feb 16 16:44:02 server sshd\[4863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.123.212.51 
Feb 16 16:44:04 server sshd\[4863\]: Failed password for invalid user test from 40.123.212.51 port 43962 ssh2
Feb 16 16:44:22 server sshd\[4878\]: Invalid user ubuntu from 40.123.212.51
Feb 16 16:44:22 server sshd\[4878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.123.212.51 
...
2020-02-17 04:28:36
167.71.9.180 attack
Feb 16 20:39:31 pi sshd[17481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.9.180 
Feb 16 20:39:34 pi sshd[17481]: Failed password for invalid user robyn from 167.71.9.180 port 56260 ssh2
2020-02-17 04:40:02
41.218.212.204 attack
Feb 16 13:44:25 ws25vmsma01 sshd[115137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.218.212.204
Feb 16 13:44:26 ws25vmsma01 sshd[115137]: Failed password for invalid user admin from 41.218.212.204 port 60077 ssh2
...
2020-02-17 04:24:06
104.245.144.43 attackspam
(From alda.mcgeehan64@outlook.com) Are you feeling stuck personally or professionally?
As a professional coach, 
I have the tools to help you find solutions.

Send me an email. Kozik@mbkcoaching.com
Free 30-minute initial session!


Majority of individuals are living their lives on autopilot, running from one thing to the next, without giving much thought about the true meaning and purpose for their life.  

“Having trained and mentored thousands of professionals throughout her 25 years as a high-level executive, Mary’s passion and purpose, as a Certified Coach, is to walk along side you to help you realize your dreams to live a life of fulfillment and success.”
CEO of Major Healthcare System


As your Personal Coach, I will:

•Take you from where you are to where you want to be 
•Guide you to figure out where you want to go

•Help you discover what is really important to you

•Hold you accountable for optimal success and fulfillment 
•Increase your self-awareness and confidence
•Expand
2020-02-17 04:35:32
37.120.222.157 attackspam
Chat Spam
2020-02-17 04:45:14
37.187.1.235 attackbotsspam
Feb 16 16:31:15 markkoudstaal sshd[24576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.1.235
Feb 16 16:31:17 markkoudstaal sshd[24576]: Failed password for invalid user roborg from 37.187.1.235 port 49824 ssh2
Feb 16 16:33:34 markkoudstaal sshd[24960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.1.235
2020-02-17 04:36:56
78.99.122.73 attackbots
ENG,WP GET /wp-login.php
2020-02-17 04:38:14
222.186.30.248 attackbotsspam
Feb 16 21:15:41 MK-Soft-VM7 sshd[22815]: Failed password for root from 222.186.30.248 port 45272 ssh2
Feb 16 21:15:44 MK-Soft-VM7 sshd[22815]: Failed password for root from 222.186.30.248 port 45272 ssh2
...
2020-02-17 04:17:11
185.200.118.77 attack
" "
2020-02-17 04:16:01

Recently Reported IPs

186.31.37.205 190.74.191.28 218.92.1.130 196.223.152.58
5.188.45.22 162.243.144.247 46.4.49.150 103.26.57.255
223.223.186.98 198.0.6.214 189.236.86.118 185.211.245.157
162.243.146.37 35.240.227.214 219.90.67.238 189.86.225.54
200.143.112.126 54.37.138.172 206.189.175.19 89.223.22.64